Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 21:08
Static task
static1
Behavioral task
behavioral1
Sample
f84a76b5c25c6b5b34c30fd841434445.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f84a76b5c25c6b5b34c30fd841434445.exe
Resource
win10v2004-20231215-en
General
-
Target
f84a76b5c25c6b5b34c30fd841434445.exe
-
Size
230KB
-
MD5
f84a76b5c25c6b5b34c30fd841434445
-
SHA1
20949be775bf43caa46678dc2364e7e60648a504
-
SHA256
23d2287f4c1ad9a4973b618d9f5bca47a520ce898ee25bcc6a02c49f64b32e95
-
SHA512
c167d67d53a3c1e9e1df7a75d14f54374530683747b44c99e5e957b27c663f9357e7fb577e6de923b8ac27eed9ae8770f4aaf87cf5e991e65e177c8af3645efb
-
SSDEEP
6144:Asr8nDyb54A0IHom40VIkb9Ic3gk38mb1LBS0YMg:j+I50IHV1XIMpMmb1Lo8g
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0003000000022505-7.dat acprotect -
Loads dropped DLL 12 IoCs
pid Process 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe -
resource yara_rule behavioral2/files/0x0003000000022505-7.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3272 f84a76b5c25c6b5b34c30fd841434445.exe 3272 f84a76b5c25c6b5b34c30fd841434445.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5dc9562578490df8bc464071f125bfc19
SHA156301a36ae4e3f92883f89f86b5d04da1e52770d
SHA2560351fe33a6eb13417437c1baaee248442fb1ecc2c65940c9996bcda574677c3f
SHA5129242f8e8ece707874ef61680cbfcba7fc810ec3a03d2cb2e803da59cc9c82badd71be0e76275574bc0c44cdfcef9b6db4e917ca8eb5391c5ae4b37e226b0c321
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977